Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler and Michael H. Breitner
This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications…
Abstract
Purpose
This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.
Design/methodology/approach
This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.
Findings
The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.
Research limitations/implications
Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.
Practical implications
This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.
Originality/value
This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.
Details
Keywords
Linchi Kwok and Michael S. Lin
This study aims to assess green food packages’ role in sustaining a restaurant’s curbside pickup service on three stages of consumer experiences: choosing a restaurant, evaluating…
Abstract
Purpose
This study aims to assess green food packages’ role in sustaining a restaurant’s curbside pickup service on three stages of consumer experiences: choosing a restaurant, evaluating their experiences of a recent purchase and weighing their post-consumption behavioral intentions after the recent purchase.
Design/methodology/approach
The service encounters framework and relevant literature guided the development of the questionnaire. A Qualtrics panel data of 314 valid questionnaires were collected and analyzed with choice experience, ordinary least squares regression and PROCESS modeling.
Findings
First, word-of-mouth (WOM) and function encounters significantly influence consumers’ first-time curbside pickup purchasing decisions. Then, service results encounter (besides distributor encounter) most significantly affects consumers’ overall curbside pickup experience. Finally, green food packages increase consumers’ shares of future purchases through their positive WOM intentions and extra efforts of revisiting the restaurant. Consumers’ perceived importance of green restaurant practices strengthens green food packages’ positive impact on extra efforts.
Practical implications
This study provides operational and marketing insights for restaurants to use food packages and sustain their curbside pickup service.
Originality/value
Besides assessing consumers’ evaluations and behavioral intentions for an off-premises restaurant service expected to stay beyond the pandemic, this research uniquely focuses on green food packages, a sustainability issue lacking research attention. The findings add new empirical insights to studies about sustainability and restaurant/food–retail operations.
Details
Keywords
Dominik Oehlschläger, Andreas H. Glas and Michael Eßig
Inaccurate capturing and processing of customer requirements result in negative economic and ecological effects. Digital twins of customer demands promise to remedy these issues…
Abstract
Purpose
Inaccurate capturing and processing of customer requirements result in negative economic and ecological effects. Digital twins of customer demands promise to remedy these issues. However, successful implementation necessitates users' technology acceptance. This study contrasts three hierarchical digital twin levels with different degrees of user integration and examines determinants for their respective acceptance.
Design/methodology/approach
A structural equation model is applied in a comparative manner, considering different levels of digital twin radicalness. A multidimensional approach is used to measure attitudes towards usage. Data are collected in the context of organisational supply management.
Findings
Results show harmonious effects across digital twin levels. This indicates that technological radicality plays only a subordinate role when assessing acceptance determinants such as user perception on ease of use, usefulness, trust and risk.
Practical implications
Rather than focussing solely on technological factors, findings suggest that users prioritise the actual outcome and efficiency of the system. This perspective offers practical implications for organisations seeking to implement advanced systems and emphasises the significance of user perceptions beyond technological features.
Social implications
The societal impact of this research are an appreciation of customer roles in the supply chain where an enhanced detection of customer needs and preferences aligns businesses with the dynamic and evolving demands of a diverse and a continuously environmentally-conscious consumer base.
Originality/value
This study applies a measurement model for technology acceptance in a unique and multidimensional manner. Thereby, a comparative analysis of user perceptions across different digital twin levels sheds more light on a nascent, promising and underexplored technological method. This interdisciplinary research combined knowledge from the supply chain management and management information systems fields by highlighting key factors for the adoption of complex technological methods.
Details
Keywords
Bharat Taneja and Kumkum Bharti
This study aims to examine the research pattern and growth trends of published research on a unified theory of acceptance and use of technology 2 (UTAUT2) from 2012 to 2019. The…
Abstract
Purpose
This study aims to examine the research pattern and growth trends of published research on a unified theory of acceptance and use of technology 2 (UTAUT2) from 2012 to 2019. The study also examines the research scope of UTAUT2 for future researchers.
Design/methodology/approach
This study has adopted a bibliometric approach followed by a structured literature review analysis to synthesize the research on UTAUT2 since 2012. In total, 163 documents were analyzed for type of studies, theories and frameworks, methodologies, author wise collaboration, organizations that contributed to the body of knowledge in the UTAUT2 research and journals that published studies in this domain. VOSviewer and Tableau were used for the data visualization, whereas TCCM, which means theory (T), context (C), characteristics (C) and methodology (M) framework is used to propose the future research directions.
Findings
The findings reveal research on UTAUT2 is growing. The structured literature analysis of the top 15 cited articles further analyzed the parsimony of new models in detail. In addition, the study highlights the inception by and promoters of UTAUT2 in a separate section. The data for this study was collected by searching the title, abstract and keywords of documents in the Scopus database.
Research limitations/implications
This study is based on research papers, published in the UTAUT2 research area, that have been extracted from the Scopus database by keywords only. Future studies can also perform a meta-analysis of various clusters generated by bibliometric analysis.
Practical implications
This study is useful for practitioners to devise strategies for increasing technology acceptance, adoption and utilization in the times to come.
Originality/value
To the best of the authors’ knowledge, this study is one of the very few and early studies, which examined patterns and growth trends of the UTAUT2 studies with the TCCM framework, to suggest scope for future research studies.
Details
Keywords
Eduard Anton, Helena Aptyka and Frank Teuteberg
This study aims to explore the vulnerabilities of the dairy industry to ransomware threats, focusing particularly on the upstream supply chain and applying routine activity theory…
Abstract
Purpose
This study aims to explore the vulnerabilities of the dairy industry to ransomware threats, focusing particularly on the upstream supply chain and applying routine activity theory (RAT) to understand the evolving dynamics of cybercrime in critical infrastructure sectors.
Design/methodology/approach
Utilizing expert interviews and network analysis, this research investigates the exploitation of complex supply chain vulnerabilities by motivated offenders. It delves into the intricate interplay between digital threats and physical supply continuity.
Findings
The study uncovers that ransomware threats transcend digital boundaries, manifesting in disruptions to physical operations and presenting significant risks to food security. It underscores the threat posed by the convergence of information technology (IT) and operational technology (OT), emphasizing the urgent need for heightened awareness and robust defenses against this substantial menace.
Practical implications
Addressing cyber vulnerabilities in critical sectors like dairy ensures not only the security of operations but also safeguards broader societal interests such as food security. Collaboration and proactive measures are essential to mitigate potential social and economic disruptions caused by cyber incidents.
Originality/value
This research fills a knowledge gap by shedding light on the nexus between cyber threats and supply chain resilience. It emphasizes the need for industries to adapt traditional defense mechanisms in the face of sophisticated digital adversaries.
Details
Keywords
Michael J. McCord, Sean MacIntyre, Paul Bidanset, Daniel Lo and Peadar Davis
Air quality, noise and proximity to urban infrastructure can arguably have an important impact on the quality of life. Environmental quality (the price of good health) has become…
Abstract
Purpose
Air quality, noise and proximity to urban infrastructure can arguably have an important impact on the quality of life. Environmental quality (the price of good health) has become a central tenet for consumer choice in urban locales when deciding on a residential neighbourhood. Unlike the market for most tangible goods, the market for environmental quality does not yield an observable per unit price effect. As no explicit price exists for a unit of environmental quality, this paper aims to use the housing market to derive its implicit price and test whether these constituent elements of health and well-being are indeed capitalised into property prices and thus implicitly priced in the market place.
Design/methodology/approach
A considerable number of studies have used hedonic pricing models by incorporating spatial effects to assess the impact of air quality, noise and proximity to noise pollutants on property market pricing. This study presents a spatial analysis of air quality and noise pollution and their association with house prices, using 2,501 sale transactions for the period 2013. To assess the impact of the pollutants, three different spatial modelling approaches are used, namely, ordinary least squares using spatial dummies, a geographically weighted regression (GWR) and a spatial lag model (SLM).
Findings
The findings suggest that air quality pollutants have an adverse impact on house prices, which fluctuate across the urban area. The analysis suggests that the noise level does matter, although this varies significantly over the urban setting and varies by source.
Originality/value
Air quality and environmental noise pollution are important concerns for health and well-being. Noise impact seems to depend not only on the noise intensity to which dwellings are exposed but also on the nature of the noise source. This may suggest the presence of other externalities that arouse social aversion. This research presents an original study utilising advanced spatial modelling approaches. The research has value in further understanding the market impact of environmental factors and in providing findings to support local air zone management strategies, noise abatement and management strategies and is of value to the wider urban planning and public health disciplines.
Details
Keywords
Gaurav Bansal and Zhuoli Axelton
IT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and…
Abstract
Purpose
IT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.
Design/methodology/approach
A controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.
Findings
The findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.
Research limitations/implications
This study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).
Practical implications
This study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.
Social implications
This study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.
Originality/value
This study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect. In addition, the study elucidates how gender roles shape employees' responses to different leadership styles through gender stereotyping and internalization.
Details
Keywords
Bushan Mathavan, Ali Vafaei-Zadeh, Haniruzila Hanifah, T. Ramayah and Sherah Kurnia
This paper aims to investigate the key enablers and inhibitors that influence the intention to use fitness wearables using the value-based adoption model (VAM).
Abstract
Purpose
This paper aims to investigate the key enablers and inhibitors that influence the intention to use fitness wearables using the value-based adoption model (VAM).
Design/methodology/approach
Data were collected using a structured online questionnaire from 323 respondents who had never used fitness wearables. A purposive sampling technique was used in this study. Smart PLS was employed to test the research framework and hypotheses using a two-step approach.
Findings
The findings support some of the hypotheses developed with R2 values of 0.622 for perceived value (PV) and 0.567 for intention to use fitness wearable. Perceived enjoyment, perceived social image and perceived usefulness had a positive effect on PV. In addition, health information sensitivity (HIS) was positively related to perceived privacy risk and health information accuracy was positively related to perceived usefulness. Surprisingly, this study did not find any significant relationship between perceived fee, perceived privacy risk, perceived health increase and perceived design aesthetics with PV.
Practical implications
This study's findings can help designers and manufacturers design fitness wearables by considering factors that users find valuable, thus satisfying consumers' needs.
Originality/value
This study tries to model behavioural intention of fitness wearable usage of individual users by using the VAM with the addition of two new antecedences, HSI and health information accuracy, to better explain the behaviour.
Details
Keywords
Catherine Viot, Charlotte Lecuyer, Caroline Bayart and Agnès Lancini
The purpose of this research is to investigate the influence of service provider benevolence trust and privacy concerns on the intention to adopt smart services (SS), in line with…
Abstract
Purpose
The purpose of this research is to investigate the influence of service provider benevolence trust and privacy concerns on the intention to adopt smart services (SS), in line with the privacy paradox. It also seeks to analyze the role of smart connected product (SCP) usage, between current and potential users.
Design/methodology/approach
The study specifically focuses on one type of SS: smart-connected car insurance based on the “pay as you drive” and/or “pay how you drive” principle. Data were collected through an online survey of 362 French drivers. Hypotheses are tested using structural equation modeling and a multigroup confirmatory factor analysis.
Findings
The results show that trust in the benevolence of the service providers positively influences the intention to adopt SS, regardless of how familiar consumers are with SCP. Conversely, privacy concerns have a negative impact on such intention, but this effect only occurs among consumers who already own SCP.
Practical implications
From a managerial perspective, this research could help service providers to successfully develop and promote SS, by establishing a relationship based on benevolence and transparency regarding the use of personal information. In addition, managers should promote SS differently when addressing SCP users, seeking to reassure them or avoid addressing privacy concerns.
Originality/value
Our study adds to the privacy paradox theoretical framework by empirically analyzing drivers of SS adoption. It highlights the key but distinct roles of privacy concerns and benevolence trust.
Details
Keywords
Vera Blazevic and Karim Sidaoui
Service providers increasingly use conversational agents (CAs), such as chatbots, to effectively communicate with customers while managing interaction costs and providing…
Abstract
Purpose
Service providers increasingly use conversational agents (CAs), such as chatbots, to effectively communicate with customers while managing interaction costs and providing round-the-clock customer service. Yet, the adoption and implementation of such agents in service contexts remains a hit-and-miss, and firms often struggle to balance their CAs implementation complexities and costs with relation to their service objectives, technology design and customer experiences. The purpose of this paper is to provide guidance on optimizing CA design, therefore, the authors develop a conceptual framework, TRISEC, that integrates service logic, technology design and customer experience to examine the implementation of CA solutions in search, experience and credence (SEC) contexts.
Design/methodology/approach
The paper draws on service marketing and communications research, combining the service context classification scheme of search, experience and credence and the technology infused service marketing triangle foci (service, technology and customer) in its conceptual development.
Findings
The authors find that an opportunity exists in recognizing the importance of context when designing CAs and aiming to achieve a balance between service objectives, technology design and customer experiences.
Originality/value
This study contributes to service management and communications research literature by providing interactive service marketing researchers with the highly generalizable TRISEC framework to aid in optimizing CA design and implementation in interactive customer communication technologies. Furthermore, the study provides an array of future research avenues. From a practical perspective, this study aims at providing managers with a means to optimize CA technology design while maintaining a balance between customer centricity and implementation complexity and costs in different service contexts.